On 5/15/2013 9:17 PM, Kevin VPN wrote:

Hi James,

Shrew v2.2.0 supports many more options for negotiating hashes and
transforms for Phase1 and Phase2 connections.  Including all the options
in one message makes it larger than the Maximum Transmission Unit
supported by most networks (typically 1500 bytes), so the packet gets
fragmented.

Interestingly, we thought we fixed a problem with fragments just before
the 2.2.0-release version.  Is there a chance that you're still using a
a beta/rc version of Shrew 2.2.0?

To avoid the fragmentation problem (i.e. so you can turn block fragments
back on), you can try two things:

1) Manually select the Phase1 and Phase2 options in the Shrew site
configuration (instead of leaving them on auto).  That should result in
smaller packets.

2) If you're using the Shrew 2.2.0-release version, you can try to
manually adjust (i.e. reduce) the MTU value for your network adapter
until the fragments disappear.
http://support.microsoft.com/kb/314053


FYI, I'll be traveling for a while, so I won't be active on the list.


Kevin,

As always, thanks for your help and I hope you enjoy your travels :)

James,

If the packet being fragmented is an IKE packet ( during phase1/2 negotiation ), then changing the MTU setting on the virtual adapter won't have any effect.

As Kevin mentioned, the 2.2.0 version has introduced support for SHA2 HMAC algorithms, which means using 'auto' will produce a larger number of proposals, and as a result, create larger IKE packets which may be transmitted as IP fragments. If the gateway is configured to drop fragmented IP packets, then the phase1/2 settings should be tuned to remove the use of 'auto'. The way Cisco, Microsoft, ipsec-tools and the Shrew Soft VPN client works around this is by supporting an IKE extension called 'IKE Fragmentation'. When in use, a full IKE PDU is broken up into IKE PDU fragments which are sent individually. The recipient re-assembles the IKE PDU fragments and processes the message. Of course, both IKE peers need to support this extension for it to work but I don't believe Juniper products support this.

Back to the adapter MTU setting: This is for client traffic being sent from the client to the server after an IPsec SA has been negotiated. If you take a 1500 byte packet, encrypt it, add headers and then wrap it in another IP packet, the resulting packet will definitely be larger then 1500 bytes. If you lower the virtual adapter MTU enough, the OS will naturally create smaller ( inner ) IP packets for client traffic. After IPsec processing, the resulting packet be small enough to pass without IP fragmentation.

Hope this helps,

-Matthew
_______________________________________________
vpn-help mailing list
[email protected]
https://lists.shrew.net/mailman/listinfo/vpn-help

Reply via email to